[go: up one dir, main page]

0% found this document useful (0 votes)
62 views10 pages

WBP MP

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 10

Maharashtra State

Board of Technical Education, Mumbai


Year 2023-24

CERTIFICATE

This is to certify that 1. Sodage Prathamesh Sunil

2. Sanmani Vaibhav Pramod

of Diploma In Computer Engineering of Bharati Vidyapeeth’s College of Engineering


Kolhapur, (Diploma) (Code: 0540) has completed Micro project of the course WBP(Web
Based Application Development) (22619) entitled “PDF Encryptor” as prescribed in the
curriculum for the academic year 2023-24

Place: Kolhapur Group No: 7

Date: _________________

Course In-charge Head of Department

Mr. Methe P.S. (Lecturer) Ms. Mane V.M.


Micro-Project Evaluation Sheet

Name of Student: Prathamesh Sunil Sodage Enrolment No.: 2105400053


Name of Programme: Diploma in Computer Engg. Semester: 6th
Course Title: WBP (Web Based App Development) Code: 22619
Title of the Micro-Project: PDF Encryptor
Course Outcomes Achieved:
a) Develop simple program using control statement.
b) Perform operations based on arrays and strings.
c) Develop programs by applying object-oriented concepts.
d) Design simple Web pages using form controls.
Assessment of Micro Project:
Sr. Characteristic to be assessed Poor Average Good Excellent Sub
No (Marks (Marks (Marks (Marks Total
. 1-3) 4-5) 6-8) 9-10)
(A) Process and Product Assessment
1 Relevance to the course
2 Literature Survey /information
collection
3 Completion of the Target as per
project proposal
4 Analysis of Data and
representation
5 Quality of Prototype/Model
6 Report Preparation

(B) Individual Presentation and Viva


7 Presentation
8 Viva

Process & Product Assessment Individual Assessment Total Marks


Part A – (6 Marks) Part B-(4 Marks) 10

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


………………………………………………………………………………………………………
………………………………………………………………………………………………………
Name and designation of the Faculty Member: Mr. Methe P.S. (Lecturer)
Signature: …………………………………
Micro-Project Evaluation Sheet
Name of Student: Vaibhav Pramod Sanmani Enrolment No.: 2105400047
Name of Programme: Diploma in Computer Engg. Semester: 6h
Course Title: WBP (Web Based App Development) Code: 22619
Title of the Micro-Project: PDF Encryptor
Course Outcomes Achieved:
a) Develop simple program using control statement.
b) Perform operations based on arrays and strings.
c) Develop programs by applying object-oriented concepts.
d) Design simple Web pages using form controls.
Assessment of Micro Project:
Sr. Characteristic to be assessed Poor Average Good Excellent Sub
No (Marks (Marks (Marks (Marks Total
. 1-3) 4-5) 6-8) 9-10)
(A) Process and Product Assessment
1 Relevance to the course
2 Literature Survey /information
collection
3 Completion of the Target as per
project proposal
4 Analysis of Data and
representation
5 Quality of Prototype/Model
6 Report Preparation

(B) Individual Presentation and Viva


7 Presentation
8 Viva

Process & Product Assessment Individual Assessment Total Marks


Part A – (6 Marks) Part B-(4 Marks) 10

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


………………………………………………………………………………………………………
……………………………………………………………………………………………
Name and designation of the Faculty Member: Mr. Methe P.S. (Lecturer)
Signature: …………………………………
Micro-Project Proposal

Medical Stock Management System

1.0 Aim of Project


a. Security Implementation: Implement AES encryption with robust key management for
PDF document security.
b. User Interface Design: Create an intuitive interface for easy PDF encryption, including
clear instructions and navigation.
c. Customization Features: Offer options for users to customize encryption parameters like
password complexity and permission settings.
d. Cross-Platform Compatibility: Ensure the encryptor works seamlessly across Windows,
macOS, Linux, and various PDF viewers.
e. Performance Optimization: Optimize encryption algorithms and code for speed and
resource efficiency while maintaining strong security standards.

2.0 Course Outcomes Addressed


a. Develop simple program using control statement.
b. Perform operations based on arrays and strings.
c. Develop programs by applying object-oriented concepts.
d. Design simple Web pages using form controls.
e. Perform database operations using MYSQL and PHP.

3.0 Proposed Methodology


The development of a PDF encryptor involves a meticulous process starting with
comprehensive requirement analysis and user feedback assimilation to define project
objectives and design specifications. Following this, the implementation phase focuses on
coding encryption algorithms like AES and creating a user-friendly interface with
customization options. Rigorous testing ensures reliability, security, and usability,
leading to iterative refinement. Upon deployment, continuous monitoring and
maintenance ensure ongoing security and performance. Through this methodology, the
PDF encryptor aims to provide robust protection for sensitive documents while offering a
seamless user experience.
4.0 Action Plan

S. No. Details of activity Planned Planned Name of


Start date Finish date Responsibl
e Team
Members
1. Topics given by Subject Teacher and
discussed on given topic with all members.

2. Collection of information related to the


topic.
3. Planning of project.
Prathamesh,
4. Analyze the collected data and finalize
Vaibhav
structure of projects.
5. Distribution of task and discussion of roles
and responsibilities of each member.
6. Design of micro-project
7. Design of micro-project
8. Implementation

9. Implementation
10. Implementation
11. Implementation
12. Report Preparation
13. Report Submission
14. PPT Preparation
15. Presentation
16. Submission of Micro project
5.0 Resources Required

S. Name of Specifications Qty. Remarks


No. Resource/material
1 Hardware: Computer Computer(i3_i5 1 -
System preferable),RAM minimum
2GB and onward but not
limited to
2 Operating System Window XP/window 1 -
7/LINUX version 5.0 or later
3 Software XAMMP Server 1 -

Name of Team Member with Roll Nos.

1. Prathamesh Sunil Sodage (3019)


2. Vaibhav Pramod Sanmani (3016)

Name of Course Teacher: Mr. Methe P.S. (Lecturer) Sign: ___________


Micro-Project Report
PDF Encryptor
1.0. Rationale

A PDF encryptor lies in the critical need to safeguard sensitive information contained within
PDF documents from unauthorized access. By implementing strong encryption algorithms and
user-friendly customization options, the PDF encryptor ensures data security while
accommodating diverse user requirements. Through rigorous testing, deployment, and ongoing
maintenance, the software aims to address the growing concerns surrounding data privacy and
confidentiality, providing users with a reliable tool to protect their valuable information
effectively.

2.0. Aim of Project

a. Security Implementation: Implement AES encryption with robust key management


for PDF document security.
b. User Interface Design: Create an intuitive interface for easy PDF encryption,
including clear instructions and navigation.
c. Customization Features: Offer options for users to customize encryption parameters
like password complexity and permission settings.
d. Cross-Platform Compatibility: Ensure the encryptor works seamlessly across
Windows, macOS, Linux, and various PDF viewers.
e. Performance Optimization: Optimize encryption algorithms and code for speed and
resource efficiency while maintaining strong security standards.

3.0. Course Outcomes Achieved


a. Develop simple program using control statement.
b. Perform operations based on arrays and strings.
c. Develop programs by applying object-oriented concepts.
d. Design simple Web pages using form controls.
4.0. Literature Review
The Pdf encryptor also delves into usability studies and human-computer interaction research to
understand how to design intuitive interfaces that balance security and user experience. Addi-
tionally, it explores case studies and technical articles on cross-platform development frame-
works and optimization techniques to ensure seamless functionality across different operating
systems and PDF viewing applications. By examining regulatory standards and compliance re-
quirements, the review ensures that the PDF encryptor meets legal obligations regarding data
protection and privacy, ultimately guiding the development process towards creating a robust
and dependable solution for securing sensitive PDF documents.

5.0. Actual Methodology Followed


The development of a PDF encryptor involves a meticulous process starting with comprehensive
requirement analysis and user feedback assimilation to define project objectives and design
specifications. Following this, the implementation phase focuses on coding encryption
algorithms like AES and creating a user-friendly interface with customization options. Rigorous
testing ensures reliability, security, and usability, leading to iterative refinement. Upon
deployment, continuous monitoring and maintenance ensure ongoing security and performance.
Through this methodology, the PDF encryptor aims to provide robust protection for sensitive
documents while offering a seamless user experience.

1. Initialize TCPDF object.


2. Set document properties such as creator, author, title, etc.
3. Add pages and content to the PDF document.
4. Set encryption parameters (e.g., printing allowed, copying allowed, etc.).
5. Set user and owner passwords for the encryption.
6. Encrypt the PDF document with the specified parameters and passwords.
7. Output the encrypted PDF document (save to file or stream to browser).
6.0. Actual Resources Used

Sr. No. Name of Specifications Quantity Remark


Resource/material
1 Hardware: Computer(i3_i5 1 -
Computer System preferable),RAM minimum
2GB and onward but not
limited to
2 Operating System Window XP/window 1 -
7/LINUX version 5.0 or later
3 Software XAMMP server 1 -

7.0 Outputs of the Micro-Projects


8.0 Skill Developed / learning outcomes
a. Proficiency in PHP programming.
b. Familiarity with TCPDF library.
c. Understanding of encryption techniques.
d. Document generation skills.
e. Security practices.
f. File handling capabilities.
g. Problem-solving skills.
h. Documentation reading proficiency.
i. Project management skills.
j. Understanding of document security principles

9.0 Application of this Micro-Project


a. Secure document sharing.
b. Confidential reports and proposals.
c. Legal contracts and agreements.
d. Medical records.
e. Financial documents.
f. Academic papers.
g. Government documents.
h. E-books and digital publications.
i. Compliance and regulatory requirements.
j. Secure backup and archiving.

You might also like